International Journal of Advanced Computer Research (IJACR) ISSN (P): 2249-7277 ISSN (O): 2277-7970 Vol - 9, Issue - 40, January 2019
  1. 1
    Google Scholar
  2. 4
    Impact Factor
A leading cyber warfare strategy according to the evolution of cyber technology after the fourth industrial revolution

Sin-Kon Kim, Sang-Pil Cheon and Jung-Ho Eom

Abstract

As science, technology is vertically advanced or horizontally combined with information and communication technology. The boundaries are broken down in all areas of physical, biological space, and cyberspace, connecting all objects in the world. Cyber battlefields are becoming more complex and intelligent in the future, so it is not possible to dominate cyber battlefields with the current cyber warfare strategy and security technology. Future cyber warfare strategy should be conceived considering the change of cyber battlefield environment and the new functions of cyber-attack tools, assuming that new science technology and information & communication technology are applied to cyber battlefield. First, we predict the change of cyber battlefield environment and the evolution of cyber-attack technology, according to the development level of current information & communication technology and we propose a cyber warfare strategy in aspect of strategic, operational, and tactical levels that can prevent future advanced cyber threats.

Keyword

Cyber warfare, Cyber strategy, First and depth strategy, Concentration and distribution operation, Maneuver tactics.

Cite this article

Kim S, Cheon S, Eom J

Refference

[1][1]http://news.chosun.com/site/data/html_dir/2018/02/16/2018021600671.html. Accessed 11 January 2018.

[2][2]http://www.dailynk.com/korean/read.php?cataId=nk00100&num=110161. Accessed 17 November 2017.

[3][3]http://www.rfa.org/korean/commentary/ae40d0dcc6b0-ce7cb7fc.html. Accessed 21 November 2017.

[4][4]Park SW. The age of artificial intelligence, trans human strategy. Science & Technology Policy. 2016; 26(11):38-41.

[5][5]https://ko.wikipedia.org/wiki/%EC%95%8C%ED%8C%8C%EA%B3%A0. Accessed 18 January 2018.

[6][6]http://www.itworld.co.kr/news/54798. Accessed 13 January 2018.

[7][7]Kim DY, Lee J.H, Park MH, Choi YH, Park YO. Trends in brain wave signal and application technology. Electronics and Telecommunications Trend.2017; 32(2):19-28.

[8][8]http://www.etnews.com/20170504000119. Accessed 21 November 2017.

[9][9]http://www.ndsl.kr/ndsl/search/detail/report/reportSearchResultDetail.do?cn=TRKO201700005055. Accessed 21 November 2017.

[10][10]Eun Y, Park KJ, Won M, Park T, Son SH. Recent trends in cyber-physical systems research. Communications of the Korean Institute of Information Scientists and Engineers. 2013; 31(12):8-15.

[11][11]Yongsoo L. Problem of definition on mixed reality and its alternative, and relationship of virtual/augmented reality. Korea Design Knowledge Journal. 2015; 34:193-202.

[12][12]https://crpc.kist.re.kr/common/attachfile/attachfileNumPdf.do?boardNo=00006437&boardInfoNo=0022&rowNo=1. Accessed 21 November 2017.

[13][13]https://www.dropcatch.com/Domain/sersc.org. Accessed 21 November 2017.

[14][14]Hur CH, Kim SP, Kim YS, Eom JH. Changes of cyber-attacks techniques and patterns after the fourth industrial revolution. In international conference on future internet of things and cloud workshops 2017 (pp. 69-74). IEEE.

[15][15]Yang BS. Development direction and implications of virtual reality / augmented reality technology. Software Policy & Research Institute Publishers, Sungnam-si; 2017.

[16][16]Park SW, Choi JH, Jin SA, Lee JY, Kim EA, Kim JH. An exploration of science and technology policy issues in response to the rise of transhumanism. Future Media Publishers, Sejong-si; 2016.

[17][17]https://www.boannews.com/media/view.asp?idx=51701. Accessed 10 January 2018.

[18][18]Kim, S. Re-examination of strategy: centering around the role of human and insight in strategic studies. Korean Journal of Military Art and Science. 2017; 73(3):153-96.

[19][19]Applegate SD. The principle of maneuver in cyber operations. In international conference on cyber conflict 2012 (pp. 1-13). IEEE.